标题: | 影像隐藏、验证与修复之研究 A Study on Image Hiding, Authentication, and Recovery |
作者: | 张御杰 林志青 Lin, Ja-Chen 资讯科学与工程研究所 |
关键字: | 资料隐藏;影像验证;影像修复;Data hiding;Image authentication;Image recovery |
公开日期: | 2008 |
摘要: | 本论文提出了数种在网路或储存系统上保护重要或隐私的影像之方法。在保护机密影像或资料方面,我们提出两个资料隐藏的方法来隐匿隐藏之资料。在传输影像前,人们常将影像先进行压缩以减少接收端的等待时间。有鉴于此,我们所提出的第一种方法是利用搜寻顺序编码法,将机密资料藏于利用向量量化压缩法所产生的索引档中,不仅不会对索引档产生任何的失真,而且接收端在解压缩的同时亦可以获得所藏匿的机密资料。为了要隐匿更大的机密影像,第二种方法则是利用改良式搜寻顺序编码法(一种利用周围像素值常有高度相似性的关系的编码法)对机密影像进行编码,并提供一个可调整的门槛值来控制抽取出的影像品质。在嵌入步骤中,利用周围像素的变异数来决定掩护影像上每个像素的隐藏量,并搭配模运算将上述的MSOC码嵌入。从实验结果得知,所产生的伪装影像与抽取出的影像的视觉品质,与一些已发表的方法相比具有竞争性。 在保护重要影像方面,我们设计两种具有不同修复能力的影像验证系统。第一种是应用于保护单张重要影像。我们利用某些相关于影像区块的性质产生验证资料,并嵌入影像区块中,可用来检测影像的完整性。同时,我们利用向量量化编码产生关于影像的修复资料,并搭配(r, n)门槛式分享方法,分散地藏到影像本身中。使得影像本身除了能侦测是否遭到恶意的窜改之外,还具有自我修复被破坏区域的能力。第二种是应用于多张影像传输或分散式储存时,可能会有因网路或储存系统不稳定而导致某些影像遗失的情形。为了解决这个问题,我们提出了一个具有交互修复能力的影像验证系统,亦即设计一套双层式分享机制来保存所有影像的修复资讯,使得影像本身除了原有的验证功能之外,还能藉由其它幸存的影像互相合作,来修复那些遗失影像。 In this dissertation, we propose several techniques to protect important data and private images in a transmission or storage system. For a confidential image or secret data, two hiding methods are proposed to conceal the existence of the hidden data in the cover images. Because people often compress digital images to reduce the waiting time of the receiver before transmitting the images, the first method uses the search-order coding to embed secret data in the index file of the vector quantization compression result. The proposed method causes no distortion to the VQ version of the image, and the receiver end can obtain both the hidden data and the VQ image. To embed a bigger confidential image, the MSOC scheme in the second method utilizes the feature of high correlation among adjacent pixels (i.e. neighboring pixels are often with similar gray-values) to encode the important image. An adjustable threshold T is used in the MSOC; and this T directly controls the quality of the extracted image. In the embedding part, we use a variance-based criterion to estimate the hiding capacity of each pixel in the cover image. Then the MSOC code is embedded in the cover image using two sets of modulus function. Experimental results show that the quality of both the stego-images and extracted important images are competitive to those obtained in many existing steganography methods reported recently. To protect important images in public environment, we develop two image authentication methods along with different recovery abilities. The first method is used to protect a single image. In the method, the authentication data for each block is generated using some related information within the block, and then embedding it into the block to serve as the attestation for the integrity of the image. Meanwhile, the recovery data obtained by vector quantization technique are shared by using an (r, n)-threshold sharing method, and then scattered all over the image. The proposed method can not only detect whether malicious manipulations have occurred, but also self-recover the tampered parts. In the transmission of multiple images, it is possible that the network connection is unstable; and hence, some images at the receiver end are lost. To solve this problem, we develop an image authentication method with cross-recovery ability to protect a group of images. In the method, a two-layer sharing scheme is designed to preserve the recovery data of all images. The proposed method can not only verify the integrity of each member of the image group, but also reconstruct those lost images by the mutual support of the surviving members. |
URI: | http://140.113.39.130/cdrfb3/record/nctu/#GT009023816 http://hdl.handle.net/11536/82524 |
显示于类别: | Thesis |
文件中的档案:
If it is a zip file, please download the file and unzip it, then open index.html in a browser to view the full text content.